'Stefan Esser has reported a vulnerability in cURL/libcURL, which has an unknown
impact.'
'The vulnerability is caused due to an off-by-one error when parsing an URL that
is longer than 256 bytes. By using a specially crafted URL, a two-byte overflow
is reportedly possible. This may be exploited to corrupt memory allocation
structures. The vulnerability is reportedly exploitable only via a direct
request to cURL and not via a redirect.'
'The vulnerability has been reported in version 7.15.0 and prior.'